Intellectual Property Protection in Collaborative Design through Lean Information Modeling and Sharing

[+] Author and Article Information
Yan Wang1

NSF Center for e-Design, University of Central Florida, 4000 Central Florida Blvd., Orlando, FL 32816-2993wangyan@mail.ucf.edu

Pamela N. Ajoku

NSF Center for e-Design, University of Pittsburgh, 1048 Benedum Hall, Pittsburgh, PA 15261pne1@pitt.edu

José C. Brustoloni

Department of Computer Science, University of Pittsburgh, 6111 Sennott Sq. Bldg., 210 S. Bouquet St., Pittsburgh, PA 15260jcb@cs.pitt.edu

Bart O. Nnaji

NSF Center for e-Design, University of Pittsburgh, 1048 Benedum Hall, Pittsburgh, PA 15261nnaji@engr.pitt.edu


Corresponding author.

J. Comput. Inf. Sci. Eng 6(2), 149-159 (Nov 23, 2005) (11 pages) doi:10.1115/1.2190235 History: Received August 12, 2004; Revised November 23, 2005

Establishing efficient, effective, and trustworthy engineering collaboration while protecting intellectual property is vital to maintain organizational competence in today’s global business environment. In this paper, a lean information modeling and sharing framework is described to support engineering data security management in a peer-to-peer collaborative environment. It allows for selective and interoperable data sharing with fine-grained access control at both the server and client sides, thus securing different levels of design information dissemination for intellectual property protection purposes. The considerations of time and value-adding activity with roles, policy delegation relation in a distributed context, and fine-grained control at data set level in the model are to adhere to the general least privilege principle in access control. Heterogeneous design data are exchanged selectively through an eXtensible Markup Language common interface, which provides a neutral format to enhance data interoperability and prevents reverse engineering.

Copyright © 2006 by American Society of Mechanical Engineers
Your Session has timed out. Please sign back in to continue.



Grahic Jump Location
Figure 1

An example of peer-to-peer collaboration relations among enterprises and within an enterprise

Grahic Jump Location
Figure 3

Hierarchical relations of roles, objects, and policies

Grahic Jump Location
Figure 4

Transitions between states and privileges

Grahic Jump Location
Figure 5

Two examples of access control policies

Grahic Jump Location
Figure 6

Different data sources/formats interaction with a common data interface

Grahic Jump Location
Figure 7

Universal linkage between files with static (aggregation, generalization, association) and dynamic (geometric and non-geometric constraint) relations across file boundaries

Grahic Jump Location
Figure 8

UL model representation and mapping

Grahic Jump Location
Figure 9

Selective information flow based on XML encryption with different key sets corresponding to various subsets of data

Grahic Jump Location
Figure 10

Lean information exchange of engine design models in UL-PML scheme

Grahic Jump Location
Figure 11

Selective geometry sharing in encrypted PML

Grahic Jump Location
Figure 12

Different views of shared data provided for different roles

Grahic Jump Location
Figure 13

Secure selective non-geometric engineering data exchange by XML encryption




Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging and repositioning the boxes below.

Related Journal Articles
Related eBook Content
Topic Collections

Sorry! You do not have access to this content. For assistance or to subscribe, please contact us:

  • TELEPHONE: 1-800-843-2763 (Toll-free in the USA)
  • EMAIL: asmedigitalcollection@asme.org
Sign In